SB2020042721 - Multiple vulnerabilities in QEMU
Published: April 27, 2020 Updated: May 5, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Integer overflow (CVE-ID: CVE-2020-11869)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow within the implementation of ATI VGA emulation in ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback.. A remote attacker on the guest operating system can abuse this flaw to crash the QEMU process, resulting in a denial of service.
2) Buffer overflow (CVE-ID: CVE-2020-11102)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary within hw/net/tulip.c in QEMU during the copying of tx/rx buffers because the frame size is not validated against the r/w data length. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.